CVE-2023-31133 – ghost
Package
Manager: npm
Name: ghost
Vulnerable Version: >=0 <5.46.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.17041 pctl0.94733
Details
Ghost vulnerable to information disclosure of private API fields ### Impact Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below. ### Patches v5.46.1 contains a fix for this issue. ### Workarounds Add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
Metadata
Created: 2023-05-03T21:57:10Z
Modified: 2023-05-03T21:57:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-r97q-ghch-82j9/GHSA-r97q-ghch-82j9.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-r97q-ghch-82j9
Finding: F038
Auto approve: 1